Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Information Technology & Software Development


41. 

Communication Architectures for Systems-on-Chip

Communication Architectures for Systems-on-Chip

By: José Ayala

Publisher: CRC Press

Publication Date: 14-MAR-2011

Insert Date: 19-APR-2014

Slots: 1.0

Table of Contents • Start Reading

This book covers the current communication architectures that are implemented in manufactured systems-on-chip, as well as those that are being proposed to overcome the existing limitations. The text addresses well-established communication buses and less-common networks on chip, along with modern technologies that propose the use of carbon nano tubes and optical links to speed up data transfer and increase both security levels and quality of service. Contributors address on-chip transaction security involving critical information and the mechanisms to protect from an external attack,...

42. 

Knowledge-based Configuration

Knowledge-based Configuration

By: Alexander Felfernig; Lothar Hotz; Claire Bagley; Juha Tiihonen

Publisher: Morgan Kaufmann

Publication Date: 02-APR-2014

Insert Date: 19-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Knowledge-based Configuration incorporates knowledge representation formalisms to capture complex product models and reasoning methods to provide intelligent interactive behavior with the user. This book represents the first time that corporate and academic worlds collaborate integrating research and commercial benefits of knowledge-based configuration. Foundational interdisciplinary material is provided for composing models from increasingly complex products and services. Case studies, the latest research, and graphical knowledge representations that increase understanding of...

43. 

Advanced Windows RT Memory Dump Analysis: ARM Version

Advanced Windows RT Memory Dump Analysis: ARM Version

By: 

Publisher: OpenTask

Publication Date: 18-MAR-2014

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

The full transcript of Software Diagnostics Services training with 9 step-by-step exercises. Learn how to navigate through memory dump space and Windows data structures to perform memory forensics, troubleshoot and debug complex software incidents. The training uses a unique and innovative pattern-driven analysis approach to speed up the learning curve. It consists of practical step-by-step exercises using WinDbg to diagnose structural and behavioural patterns in Windows RT kernel and complete (physical) memory dumps. Additional topics include memory search, kernel linked list navigation,...

44. 

Raspberry Pi Cookbook for Python Programmers

Raspberry Pi Cookbook for Python Programmers

By: Tim Cox

Publisher: Packt Publishing

Publication Date: 16-APR-2014

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Over 50 easy-to-comprehend tailor-made recipes to get the most out of the Raspberry Pi and unleash its huge potential using Python Install your first operating system, share files over the network, and run programs remotely Unleash the hidden potential of the Raspberry Pi’s powerful Video Core IV graphics processor with your own hardware accelerated 3D graphics Discover how to create your own electronic circuits to interact with the Raspberry Pi Interface with purpose-built add-ons and adapt off-the-shelf household devices In Detail The Raspberry Pi foundation has...

45. 

Getting Started with SOQL

Getting Started with SOQL

By: Magulan D

Publisher: Packt Publishing

Publication Date: 16-APR-2014

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Revolutionize the use of simple query strings to make them more efficient using SOQL Write optimized SOQL statements Discover the standards to follow while writing SOQL statements Learn how to write SOQL statements without hitting the limits set by Salesforce.com In Detail Salesforce Object Querying Language(SOQL) is used by Salesforce to search database applications. Although only one object can be queried at a time, SOQL allows for greater flexibility over the queries for more objects. This in turn allows for greater accuracy in searches, though the query does...

46. 

Outlier Detection for Temporal Data

Outlier Detection for Temporal Data

By: Manish Gupta; Jing Gao; Charu Aggarwal; Jiawei Han

Publisher: Morgan & Claypool Publishers

Publication Date: 01-MAR-2014

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Outlier (or anomaly) detection is a very broad field which has been studied in the context of a large number of research areas like statistics, data mining, sensor networks, environmental science, distributed systems, spatio-temporal mining, etc. Initial research in outlier detection focused on time series-based outliers (in statistics). Since then, outlier detection has been studied on a large variety of data types including high-dimensional data, uncertain data, stream data, network data, time series data, spatial data, and spatio-temporal data. While there have been many tutorials and...

47. 

Exploring New Roles for Librarians

Exploring New Roles for Librarians

By: Lisa Federer

Publisher: Morgan & Claypool Publishers

Publication Date: 01-MAR-2014

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Librarians have been providing support to researchers for many years, typically with a focus on responding to researchers’ needs for access to the existing literature. However, librarians’ skills and expertise make them uniquely suited to provide a wide range of assistance to researchers across the entire research process, from conception of the research question to archiving of collected data at the project’s conclusion. In response to increasingly stringent demands on researchers to share their data, and as computationally intensive and primarily data-driven scientific methods begin to take...

48. 

Rough Cuts
Object Storage with Swift

Object Storage with Swift

By: Joe Arnold

Publisher: O'Reilly Media, Inc.

Publication Date: 15-JUN-2014

Insert Date: 18-APR-2014

Table of Contents • Start Reading

Learn how to gain maximum benefit from Swift, the highly available, distributed, object/blob store for OpenStack. Written by members of the team who maintain Swift, this practical book gets system administrators up to speed on Swift’s use and administration, and includes advanced topics....

49. 

Image Encryption: A Communication Perspective

Image Encryption: A Communication Perspective

By: El-Samie, Abd; Hossam Ahmed; Ibrahim Elashry; Mai Shahieen; Osama Faragallah; El-Sayed El-Rabaie; Saleh Alshebeili

Publisher: CRC Press

Publication Date: 14-DEC-2013

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Investigating image encryption approaches, this book examines image encryption algorithms for the purpose of wireless communication of images in secure form. It considers two directions for image encryption: permutation-based encryption and diffusion-based encryption. Covering the range of image encryption principles and techniques, it presents hybrid encryption algorithms to enhance the characteristics of traditional algorithms. It explores number theory-based encryption algorithms, details the strength of different encryption algorithms, and describes their ability to work within the...

50. 

Managing Trust in Cyberspace

Managing Trust in Cyberspace

By: Sabu Thampi; Bharat Bhargava; Pradeep Atrey

Publisher: Chapman and Hall/CRC

Publication Date: 14-DEC-2013

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Bringing together cross-disciplinary expertise, this illustrated, tutorial-style text addresses fundamentals underpinning computational trust models and covers trust management processes for dynamic open systems and applications. Topics include trust in autonomic and self-organized networks, cloud computing, embedded computing, multi-agent systems, digital rights management, security and quality issues in trusting e-government service delivery, and context-aware e-commerce applications. The book walks through online identity management, examines using trust and argumentation in recommender...

51. 

Physical Layer Security in Wireless Communications

Physical Layer Security in Wireless Communications

By: Xiangyun Zhou; Lingyang Song; Yan Zhang

Publisher: CRC Press

Publication Date: 15-NOV-2013

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Physical Layer Security in Wireless Communications supplies a systematic overview of the basic concepts, recent advancements, and open issues in providing communication security at the physical layer. It introduces the key concepts, design issues, and solutions to physical layer security in single-user and multi-user communication systems, as well as large-scale wireless networks. Presenting high-level discussions along with specific examples, and illustrations, this is an ideal reference for anyone that needs to obtain a macro-level understanding of physical layer security and its role in...

52. 

Improving the Performance of Wireless LANs: A Practical Guide

Improving the Performance of Wireless LANs: A Practical Guide

By: Nurul Sarkar

Publisher: Chapman and Hall/CRC

Publication Date: 08-JAN-2014

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

This book quantifies the key factors of WLAN performance and describes methods for improvement. It provides theoretical background and empirical results for the optimum planning and deployment of indoor WLAN systems, explaining the fundamentals while supplying guidelines for design, modeling, and performance evaluation. It discusses environmental effects on WLAN systems, protocol redesign for routing and MAC, and traffic distribution; examines emerging and future network technologies; and includes radio propagation and site measurements, simulations for various network design scenarios,...

53. 

Mining User Generated Content

Mining User Generated Content

By: Marie-Francine Moens; Juanzi Li; Tat-Seng Chua

Publisher: Chapman and Hall/CRC

Publication Date: 28-JAN-2014

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

This volume is the first focused effort to compile state-of-the-art research and address future directions of UGC. It explains how to collect, index, and analyze UGC to uncover social trends and user habits. The book describes how to mine various media, including social annotation, music information retrieval, and networks, and discusses the mining and searching of different types of UGC, such as Wikis and blogs. It also presents many applications of UGC, including the use of UGC to answer questions and summarize information. ...

54. 

A First Course in Machine Learning

A First Course in Machine Learning

By: Simon Rogers; Mark Girolami

Publisher: Chapman and Hall/CRC

Publication Date: 25-OCT-2011

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Requiring minimal mathematical prerequisites, this classroom-tested text covers the core mathematical and statistical techniques needed to understand some of the most popular machine learning algorithms, including classification, clustering, and projection algorithms. The MATLAB<SUP>®</SUP>/Octave scripts available online enable readers to recreate plots that appear in the book and investigate changing model specifications and parameter values. By experimenting with the various algorithms and concepts, readers see how an abstract set of equations can be used to solve real problems. A...

55. 

Parallel Science and Engineering Applications: The Charm++ Approach

Parallel Science and Engineering Applications: The Charm++ Approach

By: Laxmikant Kale; Abhinav Bhatele

Publisher: CRC Press

Publication Date: 28-OCT-2013

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

This book highlights the use of Charm++ in a wide variety of scientific and engineering fields. It emphasizes the adaptivity, asynchrony, and message-driven execution of Charm++ and explains design choices in application development. With illustrative examples throughout, the text describes associated tools, parallelization strategies, and parallel performance. It discusses the various design considerations when writing a parallel application in Charm++ and presents the application of these design principles to applications ranging from molecular dynamics, quantum chemistry, cosmological...

56. 

Rough Cuts
Java in a Nutshell, 6th Edition

Java in a Nutshell, 6th Edition

By: Benjamin J Evans;

Publisher: O'Reilly Media, Inc.

Publication Date: 15-SEP-2014

Insert Date: 18-APR-2014

Table of Contents • Start Reading

The sixth edition of Java in a Nutshell helps experienced Java programmers get the most out of Java 7 and 8, but it’s also a learning path for new developers. With examples rewritten to take full advantage of modern Java APIs and development best practices, this fully updated book brings you up to date and gets you ready to develop Java applications for the future....

57. 

Understanding Information Retrieval Systems: Management, Types, and Standards

Understanding Information Retrieval Systems: Management, Types, and Standards

By: Marcia Bates

Publisher: Auerbach Publications

Publication Date: 20-DEC-2011

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Information retrieval (IR) is concerned with searching for documents, information within documents, metadata about documents, relational databases, and the web. This book covers the management, types, and technical standards of these increasingly important systems, including those used in libraries and museums, medicine, geographic information, music, computer-supported collaborative work, web mining, social mining, and the Semantic Web. Leading contributors in the field address digital asset management, piracy in digital media, records compliance, information storage technologies, and...

58. 

IT Release Management: A Hands-on Guide

IT Release Management: A Hands-on Guide

By: Dave Howard

Publisher: CRC Press

Publication Date: 13-JUL-2011

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

When implemented correctly, release management can help to ensure quality is integrated throughout the development, implementation, and delivery of services, applications, and infrastructure. Clearly illustrating the effective implementation of a release process, this hands-on guide examines the similarities and differences of release management and project management to clarify the distinctions between the two complementary processes. Shedding light on the day-to-day challenges that need to be overcome, it details the principles of effective implementation—including what to implement, how...

59. 

Bayesian Programming

Bayesian Programming

By: Pierre Bessiere; Emmanuel Mazer; Juan Ahuactzin; Kamel Mekhnacha

Publisher: Chapman and Hall/CRC

Publication Date: 20-DEC-2013

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

A new modeling methodology, new inference algorithms, new programming languages, and new hardware are all needed to create a complete Bayesian computing framework. Focusing on the methodology and algorithms, this book describes the first steps toward reaching that goal. It emphasizes probability as an alternative to Boolean logic, covering new methods to build probabilistic programs for real-world applications. The book encourages readers to explore emerging areas and develop new programming languages and hardware architectures. A Python package is available on a supplementary website. ...

60. 

CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits

CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits

By: James Tiller

Publisher: Auerbach Publications

Publication Date: 13-DEC-2011

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Presenting the underlying methodologies and concepts required for successful penetration testing, this book discusses the process of penetration testing from both consultative and technical perspectives. It provides an overview of the common tools and exploits used by attackers along with the rationale for why they are used. It depicts attack scenarios to show the complete cycle of attack from the hacker’s perspective. The methodology detailed provides a comprehensive solution to meeting the objectives of penetration testing. The author covers the deliverables, including the final report,...